{"id":"https://openalex.org/W4300607852","doi":"https://doi.org/10.1145/3041008.3041010","title":"EMULATOR vs REAL PHONE","display_name":"EMULATOR vs REAL PHONE","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W4300607852","doi":"https://doi.org/10.1145/3041008.3041010"},"language":"en","primary_location":{"id":"doi:10.1145/3041008.3041010","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076877194","display_name":"Mohammed K. Alzaylaee","orcid":"https://orcid.org/0000-0002-3791-3458"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohammed K. Alzaylaee","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072809002","display_name":"Suleiman Y. Yerima","orcid":"https://orcid.org/0000-0003-0346-1219"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Suleiman Y. Yerima","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076877194"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":5.4204,"has_fulltext":false,"cited_by_count":66,"citation_normalized_percentile":{"value":0.96739799,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9646000266075134,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6638636589050293},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5529285073280334},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40009981393814087}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6638636589050293},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5529285073280334},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40009981393814087},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3041008.3041010","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},{"id":"pmh:oai:www.dora.dmu.ac.uk:2086/16941","is_oa":false,"landing_page_url":"http://hdl.handle.net/2086/16941","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W7469215","https://openalex.org/W1508584952","https://openalex.org/W1647869403","https://openalex.org/W1943233084","https://openalex.org/W1963971515","https://openalex.org/W1964241047","https://openalex.org/W1990649188","https://openalex.org/W1999728176","https://openalex.org/W2015790908","https://openalex.org/W2024071684","https://openalex.org/W2065339563","https://openalex.org/W2070386561","https://openalex.org/W2090534521","https://openalex.org/W2108700604","https://openalex.org/W2122672392","https://openalex.org/W2164539435","https://openalex.org/W2199478250","https://openalex.org/W2523597572","https://openalex.org/W3104213016","https://openalex.org/W4300756997","https://openalex.org/W4301518541"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829"],"abstract_inverted_index":{"The":[0],"Android":[1,23,72,127],"operating":[2,9],"system":[3,10],"has":[4],"become":[5],"the":[6,48,59,84,92,164,184,189,203],"most":[7],"popular":[8],"for":[11],"smartphones":[12],"and":[13,76,129],"tablets":[14],"leading":[15],"to":[16,31,52,121,169,199],"a":[17,41,133],"rapid":[18],"rise":[19],"in":[20,29,71,98],"malware.":[21],"Sophisticated":[22],"malware":[24,49,73,109],"employ":[25],"detection":[26,77,110,142,194],"avoidance":[27],"techniques":[28],"order":[30],"hide":[32,53],"their":[33,54],"malicious":[34,55],"activities":[35,56],"from":[36,126,163,202],"analysis":[37,113,135,167],"tools.":[38],"These":[39],"include":[40],"wide":[42],"range":[43],"of":[44,86,94,105,136,145,188],"anti-emulator":[45],"techniques,":[46],"where":[47],"programs":[50],"attempt":[51],"by":[57,143],"detecting":[58],"emulator.":[60],"For":[61],"this":[62,99],"reason,":[63],"countermeasures":[64],"against":[65],"anti-emulation":[66,87],"are":[67],"becoming":[68],"increasingly":[69],"important":[70],"detection.":[74],"Analysis":[75],"based":[78,108,138,141,193],"on":[79,114,183],"real":[80,115],"devices":[81],"can":[82],"alleviate":[83],"problems":[85],"as":[88,90],"well":[89],"improve":[91],"effectiveness":[93],"dynamic":[95,112,124,166,205],"analysis.":[96,206],"Hence,":[97],"paper":[100],"we":[101],"present":[102],"an":[103],"investigation":[104],"machine":[106,147,191],"learning":[107,148,192],"using":[111],"devices.":[116],"A":[117],"tool":[118],"is":[119,150],"implemented":[120],"automatically":[122],"extract":[123],"features":[125,157,200],"phones":[128],"through":[130],"several":[131,146,156],"experiments,":[132],"comparative":[134],"emulator":[137],"vs.":[139],"device":[140],"means":[144],"algorithms":[149],"undertaken.":[151],"Our":[152],"study":[153],"shows":[154],"that":[155,175],"could":[158],"be":[159],"extracted":[160,201],"more":[161,178],"effectively":[162],"on-device":[165,204],"compared":[168],"emulators.":[170],"It":[171],"was":[172],"also":[173],"found":[174],"approximately":[176],"24%":[177],"apps":[179],"were":[180],"successfully":[181],"analysed":[182],"phone.":[185],"Furthermore,":[186],"all":[187],"studied":[190],"performed":[195],"better":[196],"when":[197],"applied":[198]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2022-10-03T00:00:00"}
